Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí

Ðû²¼Ê±¼ä 2021-12-02

KasperskyÅû¶APT37ʹÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯


KasperskyÅû¶APT37ʹÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯.png


KasperskyÔÚ11ÔÂ29ÈÕÅû¶³¯ÏʺڿÍ×éÖ¯APT37£¨ÓÖ³ÆScarCruft»òTemp.Reaper£©ÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£ScarCruft´Ó2012Äê×îÏÈ»îÔ¾£¬£¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úµÄ¹Ù·½»ú¹¹»ò¹«Ë¾¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2021Äê8Ô£¬£¬£¬ £¬£¬£¬£¬³õʼѬȾǰÑÔÊÇÓã²æÊ½´¹Âڻ£¬£¬£¬ £¬£¬£¬£¬Ö®ºóʹÓÃIEä¯ÀÀÆ÷ÖеÄÁ½¸öÎó²îÔÚº«¹úµÄÍøÕ¾ÖÐ×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þBLUELIGHT£¬£¬£¬ £¬£¬£¬£¬Ìᳫˮ¿Ó¹¥»÷¡£¡£¡£» £»£»î¶¯»¹Ê¹ÓÃÁ˶ñÒâÈí¼þChinotto£¬£¬£¬ £¬£¬£¬£¬Ëü¾ßÓÐÕë¶ÔPowerShell¡¢WindowsºÍAndroidµÄ¶à¸ö±äÌå¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/



Trend Micro·¢Ã÷ʹÓÃÕýµ±RAT·Ö·¢SpyAgentµÄ»î¶¯


Trend Micro·¢Ã÷ʹÓÃÕýµ±RAT·Ö·¢SpyAgentµÄ»î¶¯.png


11ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬£¬Trend Micro¹ûÕæÁ˹ØÓÚSpyAgent¹¥»÷»î¶¯µÄÑо¿¡£¡£¡£¹¥»÷ÕßÊ×ÏÈ»áÔÚÐéαµÄ¼ÓÃÜÇ®±ÒÏà¹ØÍøÕ¾·Ö·¢Î±Ôì³É¼ÓÃÜÇ®±ÒÇ®°ü¡¢¿ó¹¤Èí¼þ»ò³åÀ˲å¼þµÄDropper¡£¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬ £¬£¬£¬£¬SpyAgentµÄбäÌåʹÓÃÁ˶íÂÞ˹Õýµ±µÄÔ¶³Ì»á¼û¹¤¾ß (RAT) Safib Assistant¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬»¹Ê¹ÓÃÁËDLL²à¼ÓÔØÎó²î£¬£¬£¬ £¬£¬£¬£¬Í¨¹ý¶ñÒâDLL¸Ä¶¯RATŲÓõÄÖÖÖÖAPIº¯Êý£¬£¬£¬ £¬£¬£¬£¬¶ÔÓû§Òþ²ØRAT´°¿Ú¡£¡£¡£Ö®ºó£¬£¬£¬ £¬£¬£¬£¬¶ñÒâDLL»á·µ»ØRATµÄID£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃIDÅþÁ¬²¢¿ØÖÆÄ¿µÄ×°±¸¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/en_us/research/21/k/campaign-abusing-rats-uses-fake-websites.html



Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí


Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí.png


Çå¾²¹«Ë¾ThreatFabricÌåÏÖÔÚ2021Äê8ÔÂÖÁ11ÔÂʱ´ú£¬£¬£¬ £¬£¬£¬£¬4¸ö²î±ðµÄÒøÐÐľÂíÒÑѬȾÁè¼Ý30Íò¸öGoogle PlayÓû§¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬£¬£¬¼ì²âµ½µÄ¶ñÒâ dropperαװ2FAÉí·ÝÑéÖ¤Æ÷¡¢¶þάÂëɨÃèÆ÷ºÍPDFÎĵµÉ¨ÃèÒǵÈÓ¦Ó㬣¬£¬ £¬£¬£¬£¬Ö¼ÔÚ×°ÖÃAnatsa£¨ÓÖÃûTeaBot£©¡¢Alien¡¢ERMACºÍHydra¡£¡£¡£ÕâЩľÂí¿ÉÒÔʹÓÃ×Ô¶¯×ªÕËϵͳATS£¬£¬£¬ £¬£¬£¬£¬ÔÚÓû§²»ÖªÇéµÄÇéÐÎÏÂÇÔÈ¡Óû§ÃÜÂëºÍ»ùÓÚSMSµÄ2FAÉí·ÝÑéÖ¤´úÂë¡¢ÆÁÄ»½ØÍ¼µÈÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬ÉõÖÁÇÔÈ¡Óû§ÒøÐÐÕË»§ÖÐ×ʽ𡣡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬£¬ÕâЩӦÓÃÒÑ´ÓGoogle PlayÖÐɾ³ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html



°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀÊÀ¹Ø±Õ


°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀÊÀ¹Ø±Õ.png


2021Äê11ÔÂ23ÈÕ£¬£¬£¬ £¬£¬£¬£¬°µÍøÊг¡CannazonµÄÖÎÀíÔ±Ðû²¼½«ÓÀÊÀ¹Ø±Õ¸ÃÍøÕ¾¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬£¬£¬£¬¸ÃÍøÕ¾ÔÚ11Ô³õÔâµ½ÁË´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÖÎÀíԱͨ¹ýïÔÌ­¶©µ¥ÊýÄ¿ºÍ¹Ø±Õ²¿·ÖϵͳÒÔ»º½âÎÊÌâ¡£¡£¡£µ«ÕâÔÚÉçÇøÖÐÒýÆðÁ˾ª¶¯£¬£¬£¬ £¬£¬£¬£¬Óû§µ£ÐÄÕâÊÇÒ»³¡Í˳öȦÌס£¡£¡£ÖÎÀíÔ±ÔÚÐû²¼¹Ø±Õͨ¸æÊ±£¬£¬£¬ £¬£¬£¬£¬¹ØÓÚÕâÖÖ´¦Öóͷ£ÒªÁìÌåÏÖǸÒ⣬£¬£¬ £¬£¬£¬£¬³ÆÃ»ÓйûÕæ¹¥»÷»î¶¯ÊÇΪÁ˱£» £»£»¤Óû§ºÍÉçÇø£¬£¬£¬ £¬£¬£¬£¬ÒÔ±ÜÃ⹩ӦÉÌÊÔͼ·¢¶¯¼ÓÃÜÇ®±ÒÍ˳öȦÌס£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/



GoogleÅû¶ZoomÖÐ2¸öÎó²îµÄϸ½Ú£¬£¬£¬ £¬£¬£¬£¬ÏÖÒÑËùÓÐÐÞ¸´


GoogleÅû¶ZoomÖÐ2¸öÎó²îµÄϸ½Ú£¬£¬£¬£¬£¬£¬£¬ÏÖÒÑËùÓÐÐÞ¸´.png


Google Project ZeroÔÚ·¢Ã÷ÊÓÆµ¾Û»áÈí¼þZoomÖб£´æ2¸öÎó²î¡£¡£¡£µÚÒ»¸öΪ»º³åÇøÒç³öÎó²î£¬£¬£¬ £¬£¬£¬£¬×·×ÙΪCVE-2021-34423£¬£¬£¬ £¬£¬£¬£¬CVSSÆÀ·ÖÊÇ7.3£¬£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓøÃÎó²î¿Éµ¼ÖÂЧÀÍ»òÓ¦ÓÃÍ߽⣬£¬£¬ £¬£¬£¬£¬»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£µÚ¶þ¸öΪÄÚ´æËð»µÎó²î£¬£¬£¬ £¬£¬£¬£¬×·×ÙΪCVE-2021-34424£¬£¬£¬ £¬£¬£¬£¬CVSSÆÀ·ÖÊÇ7.3£¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜ»á̻¶Àú³ÌÄÚ´æµÄ״̬¡£¡£¡£ZoomÒÑÔÚ11ÔÂ24ÈÕÐÞ¸´ÁËÕâ2¸öÎó²î¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125122/security/video-conferencing-software-zoom-flaws.html



ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶Áè¼Ý210ÍòÓû§µÄÐÅÏ¢


ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶Áè¼Ý210ÍòÓû§µÄÐÅÏ¢.png


ÃÀ¹ú¶íº¥¶íÖݷѶû·Æ¶ûµÂµÄDNA¼ì²âÖÐÐÄ(DDC) й¶ÁË2102436¸ö¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¡£¡£¡£´Ë´Îй¶ÊÂÎñÔÚ8ÔÂ6ÈÕ¼ì²âµ½£¬£¬£¬ £¬£¬£¬£¬µ«ÆäÏêϸÐÅÏ¢½öÔÚ11ÔÂ30ÈղŹûÕæ¡£¡£¡£¾­ÊÓ²ìÈ·¶¨£¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß»á¼ûÁ˸ûú¹¹µÄÒ»¸öÊý¾Ý¿â£¬£¬£¬ £¬£¬£¬£¬ÆäÖаüÁ˺¬2004ÄêÖÁ2012ÄêÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢²ÆÎñÕ˺źÍÒøÐп¨ºÅÂë¼°ÆäPinÂë»òCVVÂëµÈÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/dna-testing-service-data-breach-users-impacted/